Select Page

Twitter Security Settings

Twitter Security Settings

This guide explains Twitter security settings and how these secure you from malicious login attempts, how you can avoid Twitter account exploitation, and the precautionary measures that you should take to protect your brand.

Twitter Security Settings

2 | P a g e


It may seem obvious to use a unique and strong password combination that includes letters (a mix of upper and lowercase) as well as numbers, but you would be surprised how few people do. Security is often overlooked until your accounts are exploited.

Malicious attempts to sabotage your personal online presence and your companies account can be very damaging. This is likely to make you feel paranoid because someone else has accessed to your personal information, including private messages!

Great passwords include not only the standard password requirements (six characters, at least one uppercase and a number) but a more diverse mix, and some non-alphanumerics (!@;:., for instance). Ideally do not use a word, or any number combinations that would be associated with you – Daisy1975 when your dog is called Daisy and you were born in 1975 is a classic example. Something like VgjT76&p would be very secure, but you are unlikely to remember it.

Login Verification

Twitter has introduced a more advanced verification process to protect its users from malicious attempts to log in. Once activated, you will need to have both your Twitter password and phone in order to access your account.

This option is available in your account’s security (click the cog at the top of the page, then settings).

3 | P a g e

Whilst this may sound overly secure for a social account, personal information could be accessed and someone else could gain the ability to share, post, and comment as you without your permission.

Login Verification

Suspicious Links

You may have seen spam emails which appear to be from Twitter. These will ask for password verification, or for you to complete a PDF and send it back to them. Obvious scams.

There will also be instances where a spammer will create a replica of the Twitter login page. This process is known as ‘phishing’ and, when successful, will provide hackers with your username and password.

Essentially, if you have gone to Twitter to log in, and the address bar at the
top of your browser does not read, be suspicious and give no personal information away.

4 | P a g e

Username & Password

It is advised that you change your password regularly; we would suggest every 3 months. The more frequently you do this, and the fewer people know your login details, the less likely you are to experience a malicious log-in. It is also better to use different passwords for everything, that way if someone gets access to one of your accounts they will not have automatic access to everything.

Operating Systems

Each computer uses an operating system and an internet browser. Both can enhance the chances of a malicious log in attempt if they are not updated regularly.

By updating you will remove any bugs and keep everything as secure as possible. Keep your antivirus up to date , the same goes for spyware, viruses and malware. All of these can cause problems and are common vulnerabilities. Keep up to date and reduce your risks!

5 | P a g e